Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Canada (1)
- Cell phone (1)
- Computer (1)
- Confidentiality (1)
- Criminal Procedure (1)
-
- Discovery (1)
- Electronic evidence (1)
- Electronic signatures (1)
- Electronic surveillance (1)
- Evidence (1)
- Freedom of expression (1)
- General warrant (1)
- Human rights (1)
- International law (1)
- Internet censorship (1)
- Privacy (1)
- Protection of privacy (1)
- Radio blocking (1)
- Search (1)
- Surveillance (1)
- Telecommunications (1)
- Telegraph (1)
- Wiretap (1)
Articles 1 - 2 of 2
Full-Text Articles in Law
Communications Disruption And Censorship Under International Law: History Lessons, Jonathon Penney
Communications Disruption And Censorship Under International Law: History Lessons, Jonathon Penney
Articles, Book Chapters, & Popular Press
With Internet censorship on the rise around the world, a variety of tools have proliferated to assist Internet users to circumvent such censorship. However, there are few studies examining the implications of censorship circumvention under international law, and its related politics. This paper aims to help fill some of that void, with an examination of case studies wherein global communications technologies have been disrupted or censored — telegram cable cutting and censorship, high frequency radio jamming, and direct broadcast satellite blocking — and how the world community responded to that disruption or censorship through international law and law making. In …
Electronic Evidence In Canada, Robert Currie, Steve Coughlan
Electronic Evidence In Canada, Robert Currie, Steve Coughlan
Articles, Book Chapters, & Popular Press
This chapter discusses the issues surrounding electronic evidence in Canada. Topics discussed include the best evidence rule, electronic signatures, web-based evidence, and video-tape and security camera evidence. In addition rules around protection of privacy, discovery, and confidentiality are pursued. Finally the chapter also considers the many issues which arise around gathering electronic evidence in the criminal context, including wiretaps, general warrants, and searches of computers and cell phones.